Sciweavers

1024 search results - page 41 / 205
» Value complete, column complete, predicate complete
Sort
View
CVPR
1997
IEEE
16 years 1 months ago
Pictorial Recognition Using Affine-Invariant Spectral Signatures
This paper describes an efficient approach to pose invariant object recognition employing pictorial recognition of image patches. A complete affine invariance is achieved by a rep...
Jezekiel Ben-Arie, Zhiqian Wang
EUROMICRO
2006
IEEE
15 years 6 months ago
Real-Time Modelling of Distributed Component-Based Applications
This paper presents a modular modelling methodology to formulate the timing behaviour of real-time distributed component-based applications. It allows to build real-time models of...
Patricia López Martínez, Julio L. Me...
ICDT
2001
ACM
110views Database» more  ICDT 2001»
15 years 4 months ago
On Answering Queries in the Presence of Limited Access Patterns
In information-integration systems, source relations often have limitations on access patterns to their data; i.e., when one must provide values for certain attributes of a relatio...
Chen Li, Edward Y. Chang
COCOON
2007
Springer
15 years 3 months ago
Scheduling Selfish Tasks: About the Performance of Truthful Algorithms
This paper deals with problems which fall into the domain of selfish scheduling: a protocol is in charge of building a schedule for a set of tasks without directly knowing their l...
George Christodoulou, Laurent Gourvès, Fann...
CORR
2010
Springer
81views Education» more  CORR 2010»
14 years 6 months ago
Analysis of Agglomerative Clustering
The diameter k-clustering problem is the problem of partitioning a finite subset of Rd into k subsets called clusters such that the maximum diameter of the clusters is minimized. ...
Marcel R. Ackermann, Johannes Blömer, Daniel ...